In order to authenticate a first entity at a second entity, a first number is
generated by way of an asymmetric cryptographic method. This first number is symmetrically
encoded and transmitted to the second entity. The second entity checks the first
number by decoding the second number and thereby authenticates the first entity.